Communication - Journal Screen captures uploaded every day. Detailed descriptions of what you did each day
Knowledge and Understanding – Specific content acquired (software), and the comprehension of its meaning and significance (understanding)
Thinking – The use of critical and creative thinking skills and/or processes Application - of knowledge and skills (e.g., concepts, processes, use of equipment and technology) Monday May 9tn 2011:
Today we listened to a video about comparing a new computer which thinks like a brain and trying<3to<3create<3that<3computer.<3Then I worked on my rj- 45 cables which I didn not finish.
Tuesday May 10th 2011:
Today we listened to a video that talked about the earliest computers and how it was used to calculate atomic bombs
Then I worked ast my rj - 45 cables and i am almost done even though I had bad luck these past days when trying to make these cables.
Relevant information:
- Attacks to a network can be devastating and can result in a loss of time and money due to damage or theft of important information or assets.
- Intruders who gain access by modifying software or exploiting software vulnerabilities are often called hackers.
- Once the hacker gains access to the network, four types of threat may arise:
Information theft
Identity theft
Data loss / manipulation
Disruption of service
-External threats arise from individuals working outside of an organization. They do not have authorized access to the computer systems or network. External attackers work their way into a network mainly from the Internet, wireless links or dialup access servers.
-Internal threats occur when someone has authorized access to the network through a user account or have physical access to the network equipment.
-Social engineering is a term that refers to the ability of something or someone to influence the behavior of a group of people.
-Three of the most commonly used techniques in social engineering are: pretexting, phishing, and vishing.
-Pretexting is a form of social engineering where an invented scenario (the pretext) is used on a victim in order to get the victim to release information or perform an action.
-Phishing is a form of social engineering where the phisher pretends to represent a legitimate outside organization
-A new form of social engineering that uses Voice over IP (VoIP) is known as vishing.
-A virus is a program that runs and spreads by modifying other programs or files.
-A worm is similar to a virus, but unlike a virus does not need to attach itself to an existing program.
- A Trojan horse is a non-self replicating program that is written to appear like a legitimate program, when in fact it is an attack tool.
-Denial of Service (DoS)
DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended users. DoS attacks can target end user systems, servers, routers, and network links.
-SYN (synchronous) Flooding: a flood of packets are sent to a server requesting a client connection. The packets contain invalid source IP addresses. The server becomes occupied trying to respond to these fake requests and therefore cannot respond to legitimate ones.
-Ping of death: a packet that is greater in size than the maximum allowed by IP (65,535 bytes) is sent to a device. This can cause the receiving system to crash.
-DDoS is a more sophisticated and potentially damaging form of the DoS attack.
-Not all attacks that cause network outages are specifically DoS attacks. A Brute force attack is another type of attack that may result in denial of services.
-Spyware is any program that gathers personal information from your computer without your permission or knowledge.
-Cookies are a form of spyware but are not always bad. They are used to record information about an Internet user when they visit websites.
-Adware is a form of spyware used to collect information about a user based on websites the user visits.
- Popups and pop-unders are additional advertising windows that display when visiting a web site.
Wednesday 11th 2011:
Today we watched a video about brain computer technology and how you can put on a headset and control things on the screen using your mind only. I thought that was very cool but it is expensive technololgy right now. And we fixed our cables. The cable that I fixed is the stright through and then the cross over.
Relevant information: -Some things to include in a security policy are: identification and authentication policies, password policies, acceptable use policies, remote access policies, and incident handling procedures.
-Software patches and updates
Virus protection
Spyware protection
Spam blockers
Popup blockers
Firewalls
-Some of the signs that a virus, worm or Trojan horse may be present include:
Computer starts acting abnormally
Program does not respond to mouse and keystrokes
Programs starting or shutting down on their own
Email program begins sending out large quantities of email
CPU usage is very high
There are unidentifiable, or a large number of processes running
Computer slows down significantly or crashes Thursday May 12 2011:
-Pcket Filtering - Prevents or allows access based on IP or MAC addresses.
Application Filtering - Prevents or allows access to specific application types based on port numbers.
URL Filtering - Prevents or allows access to websites based on specific URLs or keywords.
Stateful Packet Inspection (SPI) - Incoming packets must be legitimate responses to requests from internal hosts. Unsolicited packets are blocked unless permitted specifically. SPI can also include the capability to recognize and filter out specific types of attacks such as DoS.
-Appliance-based firewalls - An appliance-based firewall is a firewall that is built-in to a dedicated hardware device known as a security appliance.
Server-based firewalls - A server-based firewall consists of a firewall application that runs on a network operating system (NOS) such as UNIX, Windows or Novell.
Integrated Firewalls - An integrated firewall is implemented by adding firewall functionality to an existing device, such as a router.
Personal firewalls - Personal firewalls reside on host computers and are not designed for LAN implementations. They may be available by default from the OS or may be installed from an outside vendor.
-
Friday May 13th 2011:
Today I did my chatper 8 test I got really bad on it and then I did my chapter 7 retest and the retest results are shown in the screen dump below.
Then I worked on my scratch programing on the binary counter.
ACHIEVEMENT CHART: TECHNOLOGICAL EDUCATION
Knowledge
Understanding
Thinking
Communication
Journal
Application
50–59% (Level 1)
60–69% (Level 2)
70–79% (Level 3)
*
*
80–100% (Level 4
*
Communication - Journal Screen captures uploaded every day. Detailed descriptions of what you did each day
Knowledge and Understanding – Specific content acquired (software), and the comprehension of its meaning and significance (understanding)
Thinking – The use of critical and creative thinking skills and/or processesApplication - of knowledge and skills (e.g., concepts, processes, use of equipment and technology)
Monday May 9tn 2011:
Today we listened to a video about comparing a new computer which thinks like a brain and trying<3to<3create<3that<3computer.<3Then I worked on my rj- 45 cables which I didn not finish.
Tuesday May 10th 2011:
Today we listened to a video that talked about the earliest computers and how it was used to calculate atomic bombs
Then I worked ast my rj - 45 cables and i am almost done even though I had bad luck these past days when trying to make these cables.
Relevant information:
- Attacks to a network can be devastating and can result in a loss of time and money due to damage or theft of important information or assets.
- Intruders who gain access by modifying software or exploiting software vulnerabilities are often called hackers.
- Once the hacker gains access to the network, four types of threat may arise:
Information theft
Identity theft
Data loss / manipulation
Disruption of service
-External threats arise from individuals working outside of an organization. They do not have authorized access to the computer systems or network. External attackers work their way into a network mainly from the Internet, wireless links or dialup access servers.
-Internal threats occur when someone has authorized access to the network through a user account or have physical access to the network equipment.
-Social engineering is a term that refers to the ability of something or someone to influence the behavior of a group of people.
-Three of the most commonly used techniques in social engineering are: pretexting, phishing, and vishing.
-Pretexting is a form of social engineering where an invented scenario (the pretext) is used on a victim in order to get the victim to release information or perform an action.
-Phishing is a form of social engineering where the phisher pretends to represent a legitimate outside organization
-A new form of social engineering that uses Voice over IP (VoIP) is known as vishing.
-A virus is a program that runs and spreads by modifying other programs or files.
-A worm is similar to a virus, but unlike a virus does not need to attach itself to an existing program.
- A Trojan horse is a non-self replicating program that is written to appear like a legitimate program, when in fact it is an attack tool.
-Denial of Service (DoS)
DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended users. DoS attacks can target end user systems, servers, routers, and network links.
-SYN (synchronous) Flooding: a flood of packets are sent to a server requesting a client connection. The packets contain invalid source IP addresses. The server becomes occupied trying to respond to these fake requests and therefore cannot respond to legitimate ones.
-Ping of death: a packet that is greater in size than the maximum allowed by IP (65,535 bytes) is sent to a device. This can cause the receiving system to crash.
-DDoS is a more sophisticated and potentially damaging form of the DoS attack.
-Not all attacks that cause network outages are specifically DoS attacks. A Brute force attack is another type of attack that may result in denial of services.
-Spyware is any program that gathers personal information from your computer without your permission or knowledge.
-Cookies are a form of spyware but are not always bad. They are used to record information about an Internet user when they visit websites.
-Adware is a form of spyware used to collect information about a user based on websites the user visits.
- Popups and pop-unders are additional advertising windows that display when visiting a web site.
Wednesday 11th 2011:
Today we watched a video about brain computer technology and how you can put on a headset and control things on the screen using your mind only. I thought that was very cool but it is expensive technololgy right now. And we fixed our cables. The cable that I fixed is the stright through and then the cross over.
Relevant information:
-Some things to include in a security policy are: identification and authentication policies, password policies, acceptable use policies, remote access policies, and incident handling procedures.
-Software patches and updates
Virus protection
Spyware protection
Spam blockers
Popup blockers
Firewalls
-Some of the signs that a virus, worm or Trojan horse may be present include:
Computer starts acting abnormally
Program does not respond to mouse and keystrokes
Programs starting or shutting down on their own
Email program begins sending out large quantities of email
CPU usage is very high
There are unidentifiable, or a large number of processes running
Computer slows down significantly or crashes
Thursday May 12 2011:
-Pcket Filtering - Prevents or allows access based on IP or MAC addresses.
Application Filtering - Prevents or allows access to specific application types based on port numbers.
URL Filtering - Prevents or allows access to websites based on specific URLs or keywords.
Stateful Packet Inspection (SPI) - Incoming packets must be legitimate responses to requests from internal hosts. Unsolicited packets are blocked unless permitted specifically. SPI can also include the capability to recognize and filter out specific types of attacks such as DoS.
-Appliance-based firewalls - An appliance-based firewall is a firewall that is built-in to a dedicated hardware device known as a security appliance.
Server-based firewalls - A server-based firewall consists of a firewall application that runs on a network operating system (NOS) such as UNIX, Windows or Novell.
Integrated Firewalls - An integrated firewall is implemented by adding firewall functionality to an existing device, such as a router.
Personal firewalls - Personal firewalls reside on host computers and are not designed for LAN implementations. They may be available by default from the OS or may be installed from an outside vendor.
-
Friday May 13th 2011:
Today I did my chatper 8 test I got really bad on it and then I did my chapter 7 retest and the retest results are shown in the screen dump below.
Then I worked on my scratch programing on the binary counter.